Supporting Relationships in Access Control Using Role Based Access Control - John Barkley et al - Proceedings of the Fourth ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA: (October, 1999) pp. 55-65 - LERSSE-RefConfPaper-2005-014
 
<record>
  <controlfield tag="001">83</controlfield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">Rel-BAC</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">RAD</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">RBAC</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">CORBA Security</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">CORBA</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">Access Control Models and Languages</subfield>
  </datafield>
</record>